Computer-science_A-level_Cie
-
computers-and-components6 主题
-
logic-gates-and-logic-circuits2 主题
-
central-processing-unit-cpu-architecture6 主题
-
assembly-language-4 主题
-
bit-manipulation1 主题
-
operating-systems3 主题
-
language-translators2 主题
-
data-security3 主题
-
data-integrity1 主题
-
ethics-and-ownership3 主题
-
database-concepts3 主题
-
database-management-systems-dbms-1 主题
-
data-definition-language-ddl-and-data-manipulation-language-dml1 主题
-
computational-thinking-skills1 主题
-
algorithms14 主题
-
data-types-and-records2 主题
-
arrays2 主题
-
files1 主题
-
introduction-to-abstract-data-types-adt1 主题
-
programming-basics1 主题
-
constructs2 主题
-
structured-programming1 主题
-
program-development-life-cycle2 主题
-
program-design-2 主题
-
program-testing-and-maintenance3 主题
-
user-defined-data-types1 主题
-
file-organisation-and-access-3 主题
-
floating-point-numbers-representation-and-manipulation3 主题
-
protocols2 主题
-
circuit-switching-packet-switching1 主题
-
processors-parallel-processing-and-virtual-machines5 主题
-
boolean-algebra-and-logic-circuits4 主题
-
purposes-of-an-operating-system-os3 主题
-
translation-software3 主题
-
encryption-encryption-protocols-and-digital-certificates3 主题
-
artificial-intelligence-ai4 主题
-
recursion1 主题
-
programming-paradigms4 主题
-
object-oriented-programming7 主题
-
file-processing-and-exception-handling2 主题
-
data-representation5 主题
-
multimedia3 主题
-
compression2 主题
-
networks-and-the-internet11 主题
Network & internet risks
What are common network & internet risks?
Hackers
-
A hacker is someone who gains unauthorised access to computer systems or networks
-
Hackers often exploit security weaknesses to:
-
Steal sensitive data
-
Gain control of systems
-
Cause damage or disruption
-
-
Hackers are considered cybercriminals when their actions are illegal or harmful.
How do hackers gain access?
-
Hackers look for opportunities or vulnerabilities in systems, such as:
-
Unpatched software – Missing security updates can leave systems exposed
-
Out-of-date anti-malware – Older protection can fail to detect new threats
-
Weak passwords – Simple or reused passwords are easy to guess or crack
-
Effects of a hacker attack
-
When a hacker successfully gains access, it can lead to:
|
Effect |
Impact |
|---|---|
|
Data breaches |
Personal or company information is leaked or stolen |
|
Malware installation |
Hackers may install viruses or spyware to cause further harm |
|
Data loss |
Important files may be deleted or corrupted |
|
Identity theft |
Stolen personal data can be used to impersonate individuals |
|
Financial loss |
Hackers may access bank accounts or demand ransom payments |
How can hacking be prevented?
-
There are several methods to reduce the risk of being targeted by hackers:
-
Use strong passwords that are long and hard to guess
-
Enable two-factor authentication for extra login security
-
Install and regularly update anti-malware software
-
Use firewalls to block unauthorised access to the network
-
Keep all software up to date with security patches
-
Phishing
-
Phishing is a form of social engineering
-
It involves sending fraudulent, legitimate-looking emails to a large number of email addresses, claiming to be from a reputable company or trusted source to try and gain access to your details
-
Phishing often tries to coax the user to click on a login button to enter their details
What are the effects of phishing?
-
The creator of the email can gain unauthorised access to personal data such as login information, bank accounts and more
-
Phishing can lead to identity theft or fraudulent activity on credit cards and bank accounts
How can phishing be prevented?
-
Phishing can be prevented by:
-
Anti-spam filters to avoid fraudulent emails arriving in a user’s inbox
-
Training staff to recognise fraudulent emails and to avoid opening attachments from unrecognised senders
-
User access levels to prevent staff from being able to open files-types such as executable (.exe) files and batch (.bat) files
-
Pharming
-
Pharming is typing a website address into a browser and it is redirected to a ‘fake’ website to trick a user into typing in sensitive information such as passwords
-
An attacker attempts to alter DNS settings or change a users browser settings to redirect users to the fraudulent website
What are the effects of pharming?
-
The creator of the malicious content can gain unauthorised access to personal data such as login information, bank accounts and more
-
Pharming can lead to identity theft or fraudulent activity on credit cards and bank accounts
How can pharming be prevented?
-
Pharming can be prevented by:
-
Keeping anti-malware software up to date
-
Checking URLs regularly
-
Make sure the padlock icon is visible
-
Malware
-
Malware (malicious software) is the term used for any software that has been created with malicious intent to cause harm to a computer system
-
Examples of issues caused by malware include
-
Files being deleted, corrupted or encrypted
-
Internet connection becoming slow or unusable
-
Computer crashing or shutting down
-
-
Malware can exist in many forms, each designed to perform its role in different ways
|
Malware |
What it Does |
|---|---|
|
Computer virus |
|
|
Trojan |
|
|
Spyware |
|
How can malware be prevented?
-
To protect against the threat of malware:
-
Ensure code is written correctly
-
Keep anti-malware software up to date
-
Install a firewall
-
Educate users
-
Responses